Searched refs:fuzzed (Results 1 – 18 of 18) sorted by relevance
/external/openssh/regress/unittests/sshkey/ |
D | test_fuzz.c | 103 struct sshbuf *buf, *fuzzed; in sshkey_fuzz_tests() local 116 ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); in sshkey_fuzz_tests() 119 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); in sshkey_fuzz_tests() 121 if (sshkey_parse_private_fileblob(fuzzed, "", &k1, NULL) == 0) in sshkey_fuzz_tests() 123 sshbuf_reset(fuzzed); in sshkey_fuzz_tests() 125 sshbuf_free(fuzzed); in sshkey_fuzz_tests() 137 ASSERT_PTR_NE(fuzzed = sshbuf_new(), NULL); in sshkey_fuzz_tests() 140 r = sshbuf_put(fuzzed, fuzz_ptr(fuzz), fuzz_len(fuzz)); in sshkey_fuzz_tests() 142 if (sshkey_parse_public_rsa1_fileblob(fuzzed, &k1, NULL) == 0) in sshkey_fuzz_tests() 144 sshbuf_reset(fuzzed); in sshkey_fuzz_tests() [all …]
|
/external/openssh/regress/unittests/test_helper/ |
D | fuzz.c | 71 u_char *fuzzed; member 254 assert(fuzz->fuzzed != NULL); in fuzz_cleanup() 256 free(fuzz->fuzzed); in fuzz_cleanup() 294 if (fuzz->fuzzed == NULL) { in fuzz_next() 296 fuzz->fuzzed = calloc(fuzz->slen, 1); in fuzz_next() 315 assert(fuzz->fuzzed != NULL); in fuzz_next() 320 memcpy(fuzz->fuzzed, fuzz->seed, fuzz->slen); in fuzz_next() 321 fuzz->fuzzed[fuzz->o1 / 8] ^= 1 << (fuzz->o1 % 8); in fuzz_next() 327 memcpy(fuzz->fuzzed, fuzz->seed, fuzz->slen); in fuzz_next() 328 fuzz->fuzzed[fuzz->o1 / 8] ^= 1 << (fuzz->o1 % 8); in fuzz_next() [all …]
|
/external/honggfuzz/examples/terminal-emulators/ |
D | README.md | 14 feedback accumulation) will not be closed by the fuzzed binary (terminal emulator) 23 Add compiler-time instrumentation to your fuzzed terminal emulator. Typically it
|
/external/openssh/regress/misc/kexfuzz/ |
D | README | 31 fuzzed variants with the same type. It really should allow
|
/external/skia/modules/sksg/samples/ |
D | SampleSVGPong.cpp | 267 const SkScalar fuzzed = fabs(spd) + fRand.nextRangeScalar(-kBallSpeedFuzz, kBallSpeedFuzz); in fuzzBallSpeed() local 269 return sign * SkTPin(fuzzed, kBallSpeedMin, kBallSpeedMax); in fuzzBallSpeed()
|
/external/skqp/modules/sksg/samples/ |
D | SampleSVGPong.cpp | 267 const SkScalar fuzzed = fabs(spd) + fRand.nextRangeScalar(-kBallSpeedFuzz, kBallSpeedFuzz); in fuzzBallSpeed() local 269 return sign * SkTPin(fuzzed, kBallSpeedMin, kBallSpeedMax); in fuzzBallSpeed()
|
/external/honggfuzz/ |
D | README.md | 7 … file corpus is automatically shared and improved between the fuzzing threads and fuzzed processes. 10 …rt hijacked/ignored signals from crashes__ (intercepted and potentially hidden by a fuzzed program) 14 …* Supports the __persistent fuzzing mode__ (long-lived process calling a fuzzed API repeatedly) wi…
|
/external/tcpdump/tests/ |
D | TESTLIST | 66 # fuzzed pcap 176 # fuzzed pcap 256 # fuzzed pcap 263 # fuzzed pcap 289 # fuzzed pcap 591 # fuzzed pcap 596 # fuzzed pcap
|
/external/libprotobuf-mutator/ |
D | README.md | 71 // Code which needs to be fuzzed.
|
/external/flatbuffers/tests/fuzzer/ |
D | readme.md | 5 LibFuzzer is linked with the library under test, and feeds fuzzed inputs to the library via a speci…
|
/external/honggfuzz/docs/ |
D | USAGE.md | 12 fuzzed instances) 20 …* Supports __persistent fuzzing mode__ (long-lived process calling a fuzzed API repeatedly) with l…
|
D | FeedbackDrivenFuzzing.md | 198 As above, it will try to maximize the number of branches taken by CPU on behalf of the fuzzed proce…
|
/external/ImageMagick/ |
D | AUTHORS.txt | 123 Contributed numerous fuzzed-images that revealed program flaws in
|
/external/swiftshader/third_party/llvm-7.0/llvm/docs/ |
D | FuzzingLLVM.rst | 75 fuzzed __cxa_demangle to death, why not fuzz LLVM's implementation of the same
|
D | LibFuzzer.rst | 13 LibFuzzer is linked with the library under test, and feeds fuzzed inputs to the
|
/external/clang/docs/ |
D | SanitizerCoverage.rst | 401 a fuzzer in the same process as the code being fuzzed (in-process fuzzer).
|
/external/llvm/docs/ |
D | LibFuzzer.rst | 19 The fuzzer is linked with the library under test, and feeds fuzzed inputs to the
|
/external/scapy/doc/scapy/ |
D | usage.rst | 260 …ollowing example, the IP layer is normal, and the UDP and NTP layers are fuzzed. The UDP checksum …
|